As technology continues to become more and more connected to the internet, the infrastructures that our daily lives rely upon also follow suit. One manifestation of this are Intelligent Transportation Systems (ITS), the application of advanced and emerging technologies in transportation to save lives, time, money, and the environment. From autonomous vehicles to Smart Roads, ITS makes it realistic to imagine fully integrated and connected traffic systems in the future.

However, all internet-enabled technologies are open to the threat of cyberattacks, which could cause commerce disruption and revenue loss and also pose significant safety risks. This scenario is especially true when it comes to ITS. The already demonstrated and proven possibility of ITS being attacked is the main premise of our latest research paper, “Cyberattacks Against Intelligent Transportation Systems: Assessing Future Threats to ITS.” In it we discuss in detail the threats that ITS-integrated traffic infrastructure will face down the line, from attacks that deny the flow of data and information to actual disruption of functions and services. The paper also offers our recommendations, both short term and long term, on what needs to be done to secure an ITS against those very threats.

In the map below, we show a full-fledged Intelligent Transportation System. Click on the icons to see the different components as well as the potential threats that can target them.

Vehicles

Utilize the transportation network in order to navigate to their destination.

2019 SECURITY PREDICTIONS

Our security predictions for 2019 are based on our experts’ analysis of the progress of current and emerging technologies, user behavior, and market trends, and their impact on the threat landscape.View the 2019 Security Predictions

2018 MIDYEAR SECURITY ROUNDUP

A review of the first half of 2018 shows a threat landscape that not only has constant and familiar features but also has morphing and uncharted facets: Ever-present threats steadily grew while emerging ones used stealth. View the 2018 Midyear Security Roundup